User Activity Monitoring (UAM)

_________________________________________________________________

There are two areas to consider:

Personal UAM - this is about the safety of your children and your peace of mind.

This can help in the event your children, pre-teens and teens experience cyber-bullying. How? By recording all computer activity - emails, chats, instant messages, website visits (including social media sites) - the sequence of events surrounding a cyber-bullying incident can be presented to the school and or Police leaving no room for misinterpretation.

The system is also available to protect them on their Android™ or BlackBerry® mobile device. At the same time, it will give you peace of mind being able to tell they are where they say they are.

Business UAM - this is about making sure your company's computers and Android™ or BlackBerry® mobile devices are being used appropriately while ensuring secrets stay secret.

Are staff members spending more time on Facebook rather than your books?

Track And Enforce Electronic Acceptable Use Policies

Highlight unexpected, aberrant, or unsanctioned events and trends. Focus on those areas to determine if one person or a group of persons was involved, if the events were accidental or on purpose, a result of good or bad behavior, poor training, or outdated or inefficient process.

Protect Valuable Intellectual Property

Identify Intellectual Property theft and the loss of Company Confidential information, two increasingly prevalent security threats. Using easy-to-read charts and graphs or instant alerts, see if users access, transfer, or print source code, product designs, customer lists, or contact information.

Identify Security Breaches And Risks

Protect against "The Rise of the Cybercriminal." Review overall security risk surrounding the use of removable media, peer-to-peer applications, surfing of inappropriate or malicious websites, and the download of suspect or copyrighted files.

Monitor And Audit Compliance Requirements

Benchmark User Productivity

Improve efficiency and productivity by seeing if staff are properly trained, have access to the right tools, and are following the best processes and procedures. Are users or groups using outdated work methods or ignoring departmental directives? See how they are performing their tasks.

Email Capture

See a complete record of all email sent/received, including attachments. Record business standard MS Exchange, Outlook email, and even webmail.

Chat/Instant Message

Record all Chat and Instant Messages to provide an information trail of every computer-based conversation, including the name of all parties involved in a Chat/IM session.

Websites Visited

Continually monitor every web page accessed using your computers, including a record of URLs and domain names. This feature provides a quick, yet exact picture of each employee’s web surfing behavior, as well, see a Quick View chart of trend data across your organization.

Quick View Reports

The recorded activity from each user’s computer is fed into a database and provides more than 75 built-in, easy- to-read, comprehensive Quick View reports. The predefined charts can be adjusted to better reflect your environment or you can easily create entirely new charts.

Application/Program Use

Monitor and capture all applications/programs used on your organization’s computers, including the day and time a program is launched, and the total duration of activity in that program.

Screen Snapshots

Capture actual screen snapshots, enabling you to thread raw activity data to a visual record you can replay DVR-style. Screen snapshots allow you to see user activity, across time, within context. Screen snapshots capture whatever is on the computer screen as often as once per second.

Document Tracking

Determine whether files/documents may be exiting your organization via removable media or being copied to the cloud. This feature also shows who is copying or printing potentiallysensitive files or documents.

Keyword Alerts

Keyword alerts permit you to quickly learn if users have acted in ways that require immediate notification or action. Keyword alerts can trigger email or other message alerts to the appropriate people in your organization. Keyword alerts can record the user, user group, time stamp and computer from which they were triggered.

Active Time vs. Focus Time

Distinguish between a user’s active time and focus time. This means you can clearly differentiate between an application opened and left idle, and one that is opened and actively used. This distinction is invaluable when working to optimize productivity, improve training, and gather application metering data.

Home | About Us | Testimonials | Services | Hero Blog | Sense of Humour | Contact Us | help@digitalhero.ca | 905-717-5498Privacy Policy:All services are rendered with the strictest of confidence. Your personal and or business information will never be shared with, or sold to, any third party.Terms and Conditions: Prices may change without notice. Shipping, additional costs as a result of client-requested changes and taxes are extra.